What Is Known About The New Ethereum’s Network Upgrade?


On May 8, developers released a planned improvement to Ethereum’s network – a new version of the code of Casper. Hybrid Casper Friendly Finality Gadget was introduced to move network away from mining-related problems, as “excessive energy consumption, issues with equal access to mining hardware, mining pool centralization, and an emerging market of ASICs”, the ultimate goal being to move the network from a PoW to a PoS system.

Let’s see what is known about “possibly the most significant” change to the network to date, according to Ethereum News.

Energy consumption and commissions

While 2017 was exciting due to the exponential price speculation of cryptocurrencies, it emerged that neither Bitcoin nor Ether in their present form would be able to become a fully fledged alternative to fiat currencies because of their very low transaction speeds.

An additional concern was the high amount of energy required to mine leading cryptocurrencies. Therefore, it should come as no surprise that among journalists and analysts, the latest trend has been comparing mining costs to the rate of the energy consumption in each country to determine where mining would be most profitable.

Image source: Powercompare.co.uk

To date, developers of leading cryptocurrencies have failed to solve the issues related to scalability. In particular, Ethereum scales poorly despite a huge number of miners. Hypothetically, it may seem that as more people mine the cryptocurrency, the more transactions the network can handle. The reality is that as all these miners simultaneously try to process one block, the complexity of production increases and the network bandwidth remains the same. This means that even if the number of miners grows a thousand times, one block will still be produced in ten seconds and the cost of electricity would noticeably increase.

A direct consequence of poor scalability is high commissions. Miners choose transactions with a higher commission, as they are hunting for a greater reward. This leads to thousands of low commission transactions which accumulate and await processing for several days to infinity, turning the blockchain into a universe of unprocessed requests – not to mention small payments which are impossible to process.

Moreover, in recent months a fundamentally new problem has emerged. The arrival of super powerful ASIC miners in the market has become a serious threat for decentralized networks, as they increase the chances that one of the mining pools will occupy a significant share of the hash and make the network centralized.

Ethereum archipelago

Attempts to solve these problems led to an epidemic of Bitcoin hard forks aimed at creating a “new Bitcoin” with higher transaction speed. They were followed by a wave of forks among the most popular cryptocurrencies, such as Ethereum, Monero, and Litecoin. This movement was assigned the name of “ASIC resistance” and has started to gather more and more supporters as the threat of ASIC mining dominance becomes more real.

So far, one of the reasonable approaches to solving this avalanche of problems was demonstrated by the Ethereum team, who decided to create a protocol combining the parameters of two algorithms – Proof-Of-Stake (PoS) and Proof-Of-Work (PoW).

This new protocol is called Casper – Friendly Finality Gadget (FFG) and it completely changes the principles of creating and distributing Ethereum blocks, while reducing the overall complexity of the whole blockchain.

Ethereum developers are sure that the root of all the problems faced by leading cryptocurrencies is the principle of PoW:

“Although effective in coming to a decentralized consensus, PoW consumes an incredible amount of energy, has no economic finality, and has no effective strategy in resisting cartels.”

Furthermore, the performance of the blockchain operating on the PoW algorithm is limited and can hardly provide several dozen transactions per second.

Cryptocurrencies Transaction

Image source: HowMuch

For these reasons, the Ethereum team plans to move from the PoW to the PoS algorithm. The difference between the two is that in the PoW case, users buy real computers that consume energy and calculate blocks at a rate proportional to costs. The subject of purchase in the PoS case is virtual coins inside the system, which are then converted into virtual computers calculating blocks. Under this approach, the probability of signing a block depends not on the processing power, but on the number of coins on the account of a user-validator. If the validator decides to participate in the confirmation of transactions, their funds are frozen with each confirmed block rewarded.

Proof of work

The Casper protocol would become an intermediate step in the transition from PoW to PoS, combining the possibilities of both principles:

“Through the use of Ether deposits, slashing conditions, and a modified fork choice, FFG allows the underlying PoW blockchain to be finalized. As network security is greatly shifted from PoW to PoS, PoW block rewards are reduced.”

Sharding

In addition to the PoS algorithm introduced in Casper, there is another technological novelty being developed – sharding. The idea is that the nodes store only part of the distributed registry, and the underlying mathematics would ensure the system’s transparency and accountability in such a way that each node could rely on the information of others.

The founder of the Ethereum network, Vitalik Buterin, compared the elements of the sharding with islands belonging to the same archipelago:

“Imagine that Ethereum has been split into thousands of islands. Each island can do its own thing. Each of the islands has its own unique features and everyone belonging on that island, i.e. the accounts, can interact with each other and they can freely indulge in all its features. If they want to contact with other islands, they will have to use some sort of protocol.”

In other words, Ethereum’s main chain will be divided into separate chains, or shards, that associated with each other and the main block. The purpose of shards is to provide parallel processing of transactions. Each node can process its shard separately, while together nodes can work in parallel, increasing the network’s bandwidth and transaction speed by several times. At the same time, the task of scalability is solved.

Miners and validators: rescue rangers

The verification of transactions inside each shard will be performed by validators who are the main marshals of the Casper system along with the miners. The validators will ensure the legitimacy of operations with coins and act as a kind of escrow in the system, confirming transactions with their deposit. It should work the following way – if the validator has found a block that, in their opinion, should be included in blockchain, they will be able to approve it by placing a part of the deposit on this block. In the event that this block is added to blockchain, the validator will receive a reward proportional to the share that they invested. Otherwise, if they approve an incorrect or malicious block, they will lose their deposit.

Another task of validators is to create checkpoints every fifty blocks. This will ensure the completion of the blockchain and significantly increase the security of the network, since it excludes the possibility of returning transactions before the checkpoint. According to Ethereum developer Vlad Zamfir, economically any manipulation or an attempt to attack will be of no interest for validators:

“It’s as though your ASIC farm burned down if you participated in a 51 percent attack.”

The minimum deposit size the validator can make for confirmation is set at 1500 ETH which is a significant enough amount to lose and the more reason to think twice before taking part in any manipulation schemes.

The developers also provided a solution to the scalability problem which has been a critical condition for the further development of the network and Ethereum’s ability to compete with more advanced blockchain systems like Graphene.

The increase in processing speed has been reached by developers by means of participation of smaller amount of nodes and delegation of the major work to light clients. Therefore the transaction processing speed will be much higher than on a separate computer, and at the same time the entire network will be able to work on a large number of conventional laptops, while maintaining full decentralization.

Additionally, the network’s security is significantly shifted from the complexity of PoW to the completeness of PoS with the reward given to both validators and miners. At the same time, the reward for the miners for the production of ethers will decrease fivefold – from the current 3 ETH to 0.6 ETH. This will make the coin less attractive for ASIC miners and will reduce the risks of network centralization.

Validators will also become the recipients of rewards, however, in a smaller amount. Their total award is to be only 0.82 ETH per block, which is almost four times lower than the current amount. In the future, according to Vitalik Buterin, Ethereum developers will completely get rid of the PoW algorithm, leaving the reward only for validators in the amount of 0.22 ETH per block:

“Come up with an estimate for the annual rewards given out by the full Casper and sharding mechanisms. Currently, an expected value is 10 mln ETH staking at 5 percent interest, which is 500,000 ETH per year – approximately 0.22 ETH per block.”

At the same time, the efficiency of the network will increase significantly for two reasons. First of them is behind the PoS algorithm consensus which to be provided without mining, reducing energy costs and ensuring the necessary emission of ETH. Secondly, the generation time of the block will be reduced to a minimum, since it is easier to check who owns the largest share rather than to find out which of the miners has the greatest computing power.

Latest news

At the Edcon conference in early May 2018, the creator of Ethereum Vitalik Buterin reported new details about the “friendly ghost”. In particular, Casper, in addition to the reward system of validators, will provide a system of penalties. The main principle of the new reward system is the following – the greater the stake is, the lower the interest rate. For example, the owner of 2.5 mln ETH will receive an annual fee of 10 percent, and the owner of 10 mln ETH – only 5 percent.

Table

Image source: HowMuch

The amount of penalties will depend on the severity of the validators’ faults and can reach 100 percent. In particular, the validators will be subject to fines in case of frequent absence from the network. The emergence of problems with the shard or disk on which the wallet is located will be punished with a fine of 2 percent of the deposit amount. For a group of validators whose shards are simultaneously out of order, penalties will be much higher and measured in double digits. At the same time Buterin notes that the main problem of this approach will be the risk of hacker attacks, because in this case, collective penalties can leave validators without any deposits.

The last news related to the “friendly ghost” came on May 8, when one of Ethereum developers Denny Ryan published the first version of Casper’s updated code on GitHub:

“v0.1.0 marks us more clearly tagging releases to help clients and external auditors more easily track the contract and changes.”

He also added that client developers can now start writing and testing software in their own languages.

What can we expect from Casper?

The launch of the Casper FFG is planned for the summer – autumn of 2018. Since the system will be incompatible with previous versions of Ethereum software, the update will be implemented through a hard fork.

As a scalability solution, Casper remains an important blockchain upgrade and solution for both developers and ordinary users. The Ethereum foundation spent three years to apply all the accumulated experience in making the network decentralized, efficient and competitive industry improving in the long run.

With the bandwidth increased, more transactions are expected to be processed at higher speeds, which means that big companies will be able to build complex structures and develop ecosystems based on the network. A loyal enthusiastic community behind the platform will help to contribute to its development and improve its functionality.

There is still a lot of work to be done on how a new reward system will work in practice and how validators will manage the protocols, but one thing is obvious – Casper is getting closer.


Be the first to comment

Leave a Reply

Your email address will not be published.


*


Privacy Policy

WideBitcoin.com is committed to safeguarding your privacy. Contact us at if you have any questions or problems regarding the use of your Personal Data and we will gladly assist you.

By using this site or/and our services, you consent to the Processing of your Personal Data as described in this Privacy Policy.

Table of Contents

  1. Definitions used in this Policy
  2. Data protection principles we follow
  3. What rights do you have regarding your Personal Data
  4. What Personal Data we gather about you
  5. How we use your Personal Data
  6. Who else has access to your Personal Data
  7. How we secure your data
  8. Information about cookies
  9. Contact information

Definitions

Personal Data – any information relating to an identified or identifiable natural person.
Processing – any operation or set of operations which is performed on Personal Data or on sets of Personal Data.
Data subject – a natural person whose Personal Data is being Processed.
Child – a natural person under 16 years of age.
We/us (either capitalized or not)

Data Protection Principles

We promise to follow the following data protection principles:

  • Processing is lawful, fair, transparent. Our Processing activities have lawful grounds. We always consider your rights before Processing Personal Data. We will provide you information regarding Processing upon request.
  • Processing is limited to the purpose. Our Processing activities fit the purpose for which Personal Data was gathered.
  • Processing is done with minimal data. We only gather and Process the minimal amount of Personal Data required for any purpose.
  • Processing is limited with a time period. We will not store your personal data for longer than needed.
  • We will do our best to ensure the accuracy of data.
  • We will do our best to ensure the integrity and confidentiality of data.

Data Subject’s rights

The Data Subject has the following rights:

  1. Right to information – meaning you have to right to know whether your Personal Data is being processed; what data is gathered, from where it is obtained and why and by whom it is processed.
  2. Right to access – meaning you have the right to access the data collected from/about you. This includes your right to request and obtain a copy of your Personal Data gathered.
  3. Right to rectification – meaning you have the right to request rectification or erasure of your Personal Data that is inaccurate or incomplete.
  4. Right to erasure – meaning in certain circumstances you can request for your Personal Data to be erased from our records.
  5. Right to restrict processing – meaning where certain conditions apply, you have the right to restrict the Processing of your Personal Data.
  6. Right to object to processing – meaning in certain cases you have the right to object to Processing of your Personal Data, for example in the case of direct marketing.
  7. Right to object to automated Processing – meaning you have the right to object to automated Processing, including profiling; and not to be subject to a decision based solely on automated Processing. This right you can exercise whenever there is an outcome of the profiling that produces legal effects concerning or significantly affecting you.
  8. Right to data portability – you have the right to obtain your Personal Data in a machine-readable format or if it is feasible, as a direct transfer from one Processor to another.
  9. Right to lodge a complaint – in the event that we refuse your request under the Rights of Access, we will provide you with a reason as to why. If you are not satisfied with the way your request has been handled please contact us.
  10. Right for the help of supervisory authority – meaning you have the right for the help of a supervisory authority and the right for other legal remedies such as claiming damages.
  11. Right to withdraw consent – you have the right withdraw any given consent for Processing of your Personal Data.

Data we gather

Information you have provided us with
This might be your e-mail address, name, billing address, home address etc – mainly information that is necessary for delivering you a product/service or to enhance your customer experience with us. We save the information you provide us with in order for you to comment or perform other activities on the website. This information includes, for example, your name and e-mail address.

Information automatically collected about you
This includes information that is automatically stored by cookies and other session tools. For example, your shopping cart information, your IP address, your shopping history (if there is any) etc. This information is used to improve your customer experience. When you use our services or look at the contents of our website, your activities may be logged.

Information from our partners
We gather information from our trusted partners with confirmation that they have legal grounds to share that information with us. This is either information you have provided them directly with or that they have gathered about you on other legal grounds. See the list of our partners here.

Publicly available information
We might gather information about you that is publicly available.

How we use your Personal Data

We use your Personal Data in order to:

  • provide our service to you. This includes for example registering your account; providing you with other products and services that you have requested; providing you with promotional items at your request and communicating with you in relation to those products and services; communicating and interacting with you; and notifying you of changes to any services.
  • enhance your customer experience;
  • fulfil an obligation under law or contract;

We use your Personal Data on legitimate grounds and/or with your Consent.

On the grounds of entering into a contract or fulfilling contractual obligations, we Process your Personal Data for the following purposes:

  • to identify you;
  • to provide you a service or to send/offer you a product;
  • to communicate either for sales or invoicing;

On the ground of legitimate interest, we Process your Personal Data for the following purposes:

  • to send you personalized offers* (from us and/or our carefully selected partners);
  • to administer and analyse our client base (purchasing behaviour and history) in order to improve the quality, variety, and availability of products/ services offered/provided;
  • to conduct questionnaires concerning client satisfaction;

As long as you have not informed us otherwise, we consider offering you products/services that are similar or same to your purchasing history/browsing behaviour to be our legitimate interest.

With your consent we Process your Personal Data for the following purposes:

  • to send you newsletters and campaign offers (from us and/or our carefully selected partners);
  • for other purposes we have asked your consent for;

We Process your Personal Data in order to fulfil obligation rising from law and/or use your Personal Data for options provided by law. We reserve the right to anonymise Personal Data gathered and to use any such data. We will use data outside the scope of this Policy only when it is anonymised. We save your billing information and other information gathered about you for as long as needed for accounting purposes or other obligations deriving from law, but not longer than 1 year.

We might process your Personal Data for additional purposes that are not mentioned here, but are compatible with the original purpose for which the data was gathered. To do this, we will ensure that:

  • the link between purposes, context and nature of Personal Data is suitable for further Processing;
  • the further Processing would not harm your interests and
  • there would be appropriate safeguard for Processing.

We will inform you of any further Processing and purposes.

Who else can access your Personal Data

We do not share your Personal Data with strangers. Personal Data about you is in some cases provided to our trusted partners in order to either make providing the service to you possible or to enhance your customer experience. We share your data with:

Our processing partners:

  • facebook.com
  • google.com
  • bing.com
  • twitter.com
  • pinterest.com

Our business partners:

  • facebook.com
  • google.com
  • bing.com
  • twitter.com
  • pinterest.com

Connected third parties:

  • facebook.com
  • google.com
  • bing.com
  • twitter.com
  • pinterest.com

We only work with Processing partners who are able to ensure adequate level of protection to your Personal Data. We disclose your Personal Data to third parties or public officials when we are legally obliged to do so. We might disclose your Personal Data to third parties if you have consented to it or if there are other legal grounds for it.

How we secure your data

We do our best to keep your Personal Data safe. We use safe protocols for communication and transferring data (such as HTTPS). We use anonymising and pseudonymising where suitable. We monitor our systems for possible vulnerabilities and attacks.

Even though we try our best we can not guarantee the security of information. However, we promise to notify suitable authorities of data breaches. We will also notify you if there is a threat to your rights or interests. We will do everything we reasonably can to prevent security breaches and to assist authorities should any breaches occur.

If you have an account with us, note that you have to keep your username and password secret.

Children

We do not intend to collect or knowingly collect information from children. We do not target children with our services.

Cookies and other technologies we use

We use cookies and/or similar technologies to analyse customer behaviour, administer the website, track users’ movements, and to collect information about users. This is done in order to personalize and enhance your experience with us.

A cookie is a tiny text file stored on your computer. Cookies store information that is used to help make sites work. Only we can access the cookies created by our website. You can control your cookies at the browser level. Choosing to disable cookies may hinder your use of certain functions.

We use cookies for the following purposes:

  • Necessary cookies – these cookies are required for you to be able to use some important features on our website, such as logging in. These cookies don’t collect any personal information.
  • Functionality cookies – these cookies provide functionality that makes using our service more convenient and makes providing more personalised features possible. For example, they might remember your name and e-mail in comment forms so you don’t have to re-enter this information next time when commenting.
  • Analytics cookies – these cookies are used to track the use and performance of our website and services
  • Advertising cookies – these cookies are used to deliver advertisements that are relevant to you and to your interests. In addition, they are used to limit the number of times you see an advertisement. They are usually placed to the website by advertising networks with the website operator’s permission. These cookies remember that you have visited a website and this information is shared with other organisations such as advertisers. Often targeting or advertising cookies will be linked to site functionality provided by the other organisation.

You can remove cookies stored in your computer via your browser settings. Alternatively, you can control some 3rd party cookies by using a privacy enhancement platform such as optout.aboutads.info or youronlinechoices.com. For more information about cookies, visit allaboutcookies.org.

We use Google Analytics to measure traffic on our website. Google has their own Privacy Policy which you can review here. If you’d like to opt out of tracking by Google Analytics, visit the Google Analytics opt-out page.

Read more about cookies on our Cookie Policy

Contact Information

email: contact@widebitcoin.com

Changes to this Privacy Policy

We reserve the right to make change to this Privacy Policy.

You can configure your Internet browser, by changing its options, to stop accepting cookies completely or to prompt you before accepting a cookie from the website you visit. If you do not accept cookies, however, you may not be able to use all portions of the WideBitcoin Websites or all functionality of the Services.

Please note that disabling these technologies may interfere with the performance and features of the Services.

You may also disable cookies on the WideBitcoin Sites by modifying your settings here:

Visitor comments may be checked through an automated spam detection service.

Last Update: May 25, 2018